New framework for adaptive and agile honeypots

Seamus Dowling, Michael Schukat, Enda Barrett

Research output: Contribution to journalArticlepeer-review

8 Citations (Scopus)

Abstract

This paper proposes a new framework for the development and deployment of honeypots for evolving malware threats. As new technological concepts appear and evolve, attack surfaces are exploited. Internet of things significantly increases the attack surface available to malware developers. Previously independent devices are becoming accessible through new hardware and software attack vectors, and the existing taxonomies governing the development and deployment of honeypots are inadequate for evolving malicious programs and their variants. Malware-propagation and compromise methods are highly automated and repetitious. These automated and repetitive characteristics can be exploited by using embedded reinforcement learning within a honeypot. A honeypot for automated and repetitive malware (HARM) can be adaptive so that the best responses may be learnt during its interaction with attack sequences. HARM deployments can be agile through periodic policy evaluation to optimize redeployment. The necessary enhancements for adaptive, agile honeypots require a new development and deployment framework.

Original languageEnglish
Pages (from-to)965-975
Number of pages11
JournalETRI Journal
Volume42
Issue number6
DOIs
Publication statusPublished - Dec 2020

Keywords

  • adaptive
  • agile
  • framework
  • honeypots
  • reinforcement learning

Fingerprint

Dive into the research topics of 'New framework for adaptive and agile honeypots'. Together they form a unique fingerprint.

Cite this